CN103714004A - JVM online memory leak analysis method and system - Google Patents
JVM online memory leak analysis method and system Download PDFInfo
- Publication number
- CN103714004A CN103714004A CN201410002172.2A CN201410002172A CN103714004A CN 103714004 A CN103714004 A CN 103714004A CN 201410002172 A CN201410002172 A CN 201410002172A CN 103714004 A CN103714004 A CN 103714004A
- Authority
- CN
- China
- Prior art keywords
- tree
- adduction relationship
- jvm
- ram leakage
- online
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a JVM online memory leak analysis method and system. The method comprises the following steps that node information in a reference relationship tree is obtained, and the node information comprises the number of objects and the size of space occupied by nodes; node information in the reference relationship tree is obtained again after a preset period, and a corresponding reference relationship changing tree is constructed according to the node information obtained twice; JVM memory leak is analyzed online according to the reference relationship changing tree. By means of the JVM online memory leak analysis method and system, the JVM memory leak condition can be analyzed online precisely.
Description
Technical field
The present invention relates to field of computer technology, be specifically related to the online RAM leakage analytical approach of a kind of JVM and the online RAM leakage analytic system of a kind of JVM.
Background technology
JVM(Java Virtual Machine, Java Virtual Machine) in operational process, often there is RAM leakage situation.Traditional RAM leakage analytical approach is generally: OOM(Out Of Memory is occurring, and internal memory overflows) or manually after dump, by analyzing dump file, analyze RAM leakage situation.
In addition, in JVM operational process, can, by the adduction relationship tree number in Visualvm, JProfile monitoring java virutal machine memory, size etc., can know roughly online the information that JVM internal memory overflows.But these information are too general, accurate object and the situation of change thereof in monitoring analysis virtual machine.
Summary of the invention
Based on this, the invention provides the online RAM leakage analytical approach of a kind of JVM and system, can analyze accurately the situation of JVM RAM leakage.
For achieving the above object, the present invention adopts following technical scheme:
The online RAM leakage analytical approach of JVM, comprises the following steps:
Obtain each nodal information in adduction relationship tree, described nodal information comprises the quantity of object and the size that node takes up room;
After the schedule time, again obtain each nodal information in described adduction relationship tree, and according to the nodal information obtaining for twice, build corresponding adduction relationship and change tree;
According to described adduction relationship, change tree on-line analysis JVM RAM leakage.
The online RAM leakage analytic system of JVM, comprising:
Acquisition module, for obtaining each nodal information of adduction relationship tree, described nodal information comprises the quantity of object and the size that node takes up room;
Build module, for again obtain described each nodal information of adduction relationship tree after the schedule time, and according to the nodal information obtaining for twice, build adduction relationship and change tree;
Analysis module, for changing tree on-line analysis JVM RAM leakage according to described adduction relationship.
In sum, the online RAM leakage analytical approach of a kind of JVM of the present invention and system, by obtaining respectively each nodal information in the adduction relationship book before and after the schedule time, according to the nodal information obtaining for twice, build corresponding adduction relationship and change tree, and change according to this adduction relationship the leak case that tree carries out on-line analysis internal memory.The solution of the present invention by reference relationship change tree can be within each time period the situation of on-line analysis JVM RAM leakage, therefore can not only initial stage of development accurately on-line analysis JVM whether there is RAM leakage, and can also before there is OOM, send early warning and tentatively search problem.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the online RAM leakage analytical approach of a kind of JVM in the embodiment of the present invention;
Fig. 2 is the schematic diagram of the benchmark adduction relationship tree in the embodiment of the present invention;
Fig. 3 is the schematic diagram of the adduction relationship tree after the variation in the embodiment of the present invention;
Fig. 4 is that the adduction relationship in the embodiment of the present invention changes the schematic diagram of tree;
Fig. 5 is the online RAM leakage analytic system of a kind of JVM schematic diagram in the embodiment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
Shown in Figure 1, the online RAM leakage analytical approach of a kind of JVM, comprises the following steps:
Step S101, obtains each nodal information in adduction relationship tree, and described nodal information comprises the quantity of object and the size that node takes up room.The adduction relationship tree obtaining in this step can be the benchmark adduction relationship tree of object, and initialization is applied relational tree to this.The process and the full GC that obtain an object reference relational tree are similar.In conjunction with shown in Figure 2 from, GC Root starts downward search, sets up adduction relationship tree, in an adduction relationship node, if there are identical tired a plurality of objects, by figure denote object number, and records total size that this node node takes up room.In setting up adduction relationship process, recurrence is quoted not record, thus due to object all can quote java.lang.Class, therefore do not need to be recorded in adduction relationship yet.Be denoted as shown in Figure 2 Object B(2,258) node, the instance objects of representation class B has two, taking total memory headroom is 258.
Step S102 again obtains each nodal information in described adduction relationship tree after the schedule time, and according to the nodal information obtaining for twice, builds corresponding adduction relationship and change tree.After the time interval of setting or under user operates triggering (as user checks), again obtain described adduction relationship tree, there is variation in adduction relationship tree relative datum adduction relationship tree now.The adduction relationship tree having changed by analysis, and and step S101 in the adduction relationship tree that obtains compare calculating, according to the result of calculating, obtain adduction relationship and change tree.The adduction relationship tree having changed is abandoned, and preserve adduction relationship variation tree.
Step S103, changes tree on-line analysis JVM RAM leakage according to described adduction relationship.
As a good embodiment, describedly according to the nodal information obtaining for twice, build the process that adduction relationship changes tree and specifically can comprise the following steps:
Step S1021, subtracts the adduction relationship tree obtaining before the schedule time with interval and calculates again obtain described adduction relationship tree after the schedule time.As when building adduction relationship variation tree, by the adduction relationship tree having changed, deduct benchmark adduction relationship tree and produce.Described adduction relationship changes tree and also by root node, is set out, till newly-increased leaf node.
Step S1022, obtains the change information of each nodal information according to result of calculation.For example in the contrast of two adduction relationships tree, node is unchanged but while having newly-increased child node, adduction relationship records this change information in changing, for example, can and take up room Object node number and be 0.Adduction relationship tree is changed to Fig. 3 adduction relationship tree at certain time intervals afterwards as shown in Figure 2.And the newly-increased reference object object D of node Object A, root node newly-increased reference object Object B, its reference object Object E in two adduction relationship trees.
Step S1023, builds adduction relationship according to described change information and changes tree.For example above-mentioned newly-increased node can be added adduction relationship to change in tree, in node object, record object variation part.Build adduction relationship and change tree, the change information obtaining after the adduction relationship tree shown in Fig. 2 and Fig. 3 is calculated adds adduction relationship to change in tree.As shown in Figure 4, node Object A is unchanged but have newly-increased child node, adduction relationship records this node Object A(0 in changing, 0), newly-increased node Object D, Object E add in in-tree, and Object B increases an object, takies 62 byte spaces, record Object B(1,62).
As a good embodiment, the process that changes tree on-line analysis JVM RAM leakage according to described adduction relationship specifically can comprise the following steps:
Adduction relationship in the schedule time is changed to each node in tree to be analyzed;
According to analysis result, obtain object variation trend map in adduction relationship tree, can realize on-line analysis object variation trend; Described analysis result can comprise that adduction relationship changes the number of objects of each node in burl and the space taking;
According to object predetermined in described object variation trend map, carry out on-line analysis JVM memory overflow.
Owing to may having more object variation in virtual machine, so predetermine one can refer to the object of user's appointment or change maximum node objects.By can analyze these to the variation of predetermine one, whether whether still need to stay virutal machine memory because RAM leakage causes, thereby realize online RAM leakage analysis.
As a good embodiment, the process that changes tree on-line analysis RAM leakage according to described adduction relationship specifically can also comprise the following steps:
According to described object variation trend map, judge whether to exist RAM leakage;
If so, there is memory overflow in explanation, can search and quote path and memory overflow point according to the adduction relationship that changes object; Otherwise there is not memory overflow, continue adduction relationship tree to analyze.By checking changing the analysis of the adduction relationship of object, can locate and quote path and RAM leakage point.To the object continuing to increase, can may there is RAM leakage and finally can cause the OOM of virtual machine by this point of anticipation, having sent in advance early warning.For example, comparison diagram 2 and the application relational tree shown in Fig. 3, the object of node Object B is by (2,258) be varied to (3,20), the object of known Object B has increased by one, takes up room 62, total space 86(that increases is because the Object E that B quotes quotes without other, count B gross space), at this moment between in interval, as the reason of object B without this variation, can judge that RAM leakage has occurred object B, thus orientation problem.
Corresponding with the online RAM leakage analytical approach of a kind of JVM in above-described embodiment, embodiments of the invention also provide the online RAM leakage analytic system of a kind of JVM, as shown in Figure 5, comprising:
Acquisition module 101, for obtaining each nodal information of adduction relationship tree, described nodal information comprises the quantity of object and the size that node takes up room;
Build module 102, for again obtain described each nodal information of adduction relationship tree after the schedule time, and according to the nodal information obtaining for twice, build adduction relationship and change tree;
Analysis module 103, for changing tree on-line analysis JVM RAM leakage according to described adduction relationship.
As a good embodiment, described structure module specifically can comprise:
Computing module, for calculating with the adduction relationship tree obtaining before the schedule time at interval again obtain described adduction relationship tree after the schedule time;
Change information acquisition module, for obtaining the change information of each nodal information according to result of calculation;
Build submodule, for building adduction relationship according to described change information, change tree.
As a good embodiment, described analysis module specifically can also comprise:
First analyzes submodule, changes each node of tree analyze for the adduction relationship in the schedule time;
Trend map acquisition module, for obtaining each node object variation trend map according to analysis result;
Second analyzes submodule, for carrying out on-line analysis JVM memory overflow according to the predetermined object of described object variation trend map.
As a good embodiment, described analysis module specifically can also comprise:
Judge module, for judging whether to exist RAM leakage according to described object variation trend map;
Search module, for when judgment result is that of described judge module is, according to the adduction relationship inquiry that changes object, quote path and memory overflow point.
Other technical characterictic of the online RAM leakage analytic system of above-mentioned a kind of JVM is identical with the online RAM leakage analytical approach of a kind of JVM of the present invention, and it will not go into details herein.
By above scheme, can find out, the online RAM leakage analytical approach of a kind of JVM and the system of the embodiment of the present invention, by obtaining respectively each nodal information in the adduction relationship book before and after the schedule time, according to the nodal information obtaining for twice, build corresponding adduction relationship and change tree, and change according to this adduction relationship the leak case that tree carries out on-line analysis internal memory.The solution of the present invention by reference relationship change tree can be within each time period the situation of on-line analysis JVM RAM leakage, therefore can not only initial stage of development accurately on-line analysis JVM whether there is RAM leakage, and can also before there is OOM, send early warning and tentatively search problem.
It should be noted that, unless context separately has the description of specific distinct, the element in the present invention and assembly, the form that quantity both can be single exists, and form that also can be a plurality of exists, and the present invention does not limit this.In addition, although the step in the present invention is arranged with label, but and be not used in the precedence that limits step, unless expressly stated the order of step or the execution of certain step need other steps as benchmark, otherwise the relative order of step is adjustable.
The above embodiment has only expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.
Claims (8)
1. the online RAM leakage analytical approach of JVM, is characterized in that, comprises the following steps:
Obtain each nodal information in adduction relationship tree, described nodal information comprises the quantity of object and the size that node takes up room;
After the schedule time, again obtain each nodal information in described adduction relationship tree, and according to the nodal information obtaining for twice, build corresponding adduction relationship and change tree;
According to described adduction relationship, change tree on-line analysis JVM RAM leakage.
2. the online RAM leakage analytical approach of JVM according to claim 1, is characterized in that, the process that changes tree on-line analysis JVM RAM leakage according to described adduction relationship comprises the following steps:
Adduction relationship in the schedule time is changed to each node in tree to be analyzed;
According to analysis result, obtain object variation trend map in adduction relationship tree;
According to object predetermined in described object variation trend map, carry out on-line analysis JVM memory overflow.
3. the online RAM leakage analytical approach of JVM according to claim 2, is characterized in that, the process that changes tree on-line analysis RAM leakage according to described adduction relationship is further comprising the steps of:
According to described object variation trend map, judge whether to exist RAM leakage;
If so, according to the adduction relationship that changes object, search and quote path and memory overflow point.
4. the online RAM leakage analytical approach of JVM according to claim 1, is characterized in that, describedly according to the nodal information obtaining for twice, builds the process that adduction relationship changes tree and comprises the following steps:
By again obtain described adduction relationship tree after the schedule time, subtract the adduction relationship tree obtaining before the schedule time with interval and calculate;
According to result of calculation, obtain the change information of each nodal information;
According to described change information, build adduction relationship and change tree.
5. the online RAM leakage analytic system of JVM, is characterized in that, comprising:
Acquisition module, for obtaining each nodal information of adduction relationship tree, described nodal information comprises the quantity of object and the size that node takes up room;
Build module, for again obtain described each nodal information of adduction relationship tree after the schedule time, and according to the nodal information obtaining for twice, build adduction relationship and change tree;
Analysis module, for changing tree on-line analysis JVM RAM leakage according to described adduction relationship.
6. the online RAM leakage analytic system of JVM according to claim 5, is characterized in that, described analysis module comprises:
First analyzes submodule, changes each node of tree analyze for the adduction relationship in the schedule time;
Trend map acquisition module, for obtaining each node object variation trend map according to analysis result;
Second analyzes submodule, for carrying out on-line analysis JVM memory overflow according to the predetermined object of described object variation trend map.
7. the online RAM leakage analytic system of JVM according to claim 6, is characterized in that, described analysis module also comprises:
Judge module, for judging whether to exist RAM leakage according to described object variation trend map;
Search module, for when judgment result is that of described judge module is, according to the adduction relationship inquiry that changes object, quote path and memory overflow point.
8. the online RAM leakage analytic system of JVM according to claim 5, is characterized in that, described structure module comprises:
Computing module, for calculating with the adduction relationship tree obtaining before the schedule time at interval again obtain described adduction relationship tree after the schedule time;
Change information acquisition module, for obtaining the change information of each nodal information according to result of calculation;
Build submodule, for building adduction relationship according to described change information, change tree.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410002172.2A CN103714004A (en) | 2014-01-02 | 2014-01-02 | JVM online memory leak analysis method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410002172.2A CN103714004A (en) | 2014-01-02 | 2014-01-02 | JVM online memory leak analysis method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103714004A true CN103714004A (en) | 2014-04-09 |
Family
ID=50407001
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410002172.2A Pending CN103714004A (en) | 2014-01-02 | 2014-01-02 | JVM online memory leak analysis method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103714004A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105204996A (en) * | 2015-09-24 | 2015-12-30 | 努比亚技术有限公司 | Memory leak detection device and method and terminal |
CN105630662A (en) * | 2014-10-28 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Memory detection method and apparatus |
CN105790992A (en) * | 2014-12-25 | 2016-07-20 | 深圳Tcl数字技术有限公司 | Method and device for managing network node information |
CN107102922A (en) * | 2017-04-01 | 2017-08-29 | 北京三快在线科技有限公司 | Internal-memory detection method, device and electronic equipment |
CN108073441A (en) * | 2016-11-14 | 2018-05-25 | 阿里巴巴集团控股有限公司 | A kind of virutal machine memory monitoring and managing method and equipment |
CN108073439A (en) * | 2016-11-11 | 2018-05-25 | 深圳业拓讯通信科技有限公司 | A kind of JVM RAM leakages automatic testing method and system |
CN108664390A (en) * | 2017-03-31 | 2018-10-16 | 华为技术有限公司 | A kind of method for detecting memory leakage and equipment |
CN109032827A (en) * | 2018-07-03 | 2018-12-18 | 郑州云海信息技术有限公司 | It is a kind of to track the test macro and method for leading to memory overflow exception |
CN110502891A (en) * | 2019-08-08 | 2019-11-26 | 北京字节跳动网络技术有限公司 | A kind of method, apparatus, medium and electronic equipment obtaining proceeding internal memory leakage |
CN110888712A (en) * | 2019-10-10 | 2020-03-17 | 望海康信(北京)科技股份公司 | Java virtual machine optimization method and system |
CN111352829A (en) * | 2019-11-21 | 2020-06-30 | 杭州迪普科技股份有限公司 | Memory leak test method, device and equipment |
CN111352734A (en) * | 2020-02-26 | 2020-06-30 | 烽火通信科技股份有限公司 | Memory leak detection method and memory management module |
CN111858068A (en) * | 2020-07-31 | 2020-10-30 | 重庆紫光华山智安科技有限公司 | Method and device for positioning Java program performance problem |
CN111858339A (en) * | 2020-07-22 | 2020-10-30 | 腾讯科技(成都)有限公司 | Memory analysis method, device and system, computing device and computer-readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050268286A1 (en) * | 2004-04-12 | 2005-12-01 | Motoki Obata | Method of detecting memory leak causing portion and execution program thereof |
US20080301646A1 (en) * | 2007-05-29 | 2008-12-04 | Satish Chandra Gupta | Detecting Dangling Pointers and Memory Leaks Within Software |
CN101710303A (en) * | 2009-12-01 | 2010-05-19 | 中国人民解放军国防科学技术大学 | Memory leakage detecting method based on flow sensitivity and context sensitivity directing picture |
CN102148844A (en) * | 2010-02-09 | 2011-08-10 | 深圳市金蝶中间件有限公司 | Memory leak positioning method, server, client and system |
-
2014
- 2014-01-02 CN CN201410002172.2A patent/CN103714004A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050268286A1 (en) * | 2004-04-12 | 2005-12-01 | Motoki Obata | Method of detecting memory leak causing portion and execution program thereof |
US20080301646A1 (en) * | 2007-05-29 | 2008-12-04 | Satish Chandra Gupta | Detecting Dangling Pointers and Memory Leaks Within Software |
CN101710303A (en) * | 2009-12-01 | 2010-05-19 | 中国人民解放军国防科学技术大学 | Memory leakage detecting method based on flow sensitivity and context sensitivity directing picture |
CN102148844A (en) * | 2010-02-09 | 2011-08-10 | 深圳市金蝶中间件有限公司 | Memory leak positioning method, server, client and system |
Non-Patent Citations (1)
Title |
---|
查伟: ""关于 Java内存泄漏问题的研究"", 《咸宁学院学报》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105630662A (en) * | 2014-10-28 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Memory detection method and apparatus |
CN105630662B (en) * | 2014-10-28 | 2019-07-19 | 腾讯科技(深圳)有限公司 | Internal-memory detection method and device |
CN105790992A (en) * | 2014-12-25 | 2016-07-20 | 深圳Tcl数字技术有限公司 | Method and device for managing network node information |
CN105204996A (en) * | 2015-09-24 | 2015-12-30 | 努比亚技术有限公司 | Memory leak detection device and method and terminal |
CN108073439A (en) * | 2016-11-11 | 2018-05-25 | 深圳业拓讯通信科技有限公司 | A kind of JVM RAM leakages automatic testing method and system |
CN108073441A (en) * | 2016-11-14 | 2018-05-25 | 阿里巴巴集团控股有限公司 | A kind of virutal machine memory monitoring and managing method and equipment |
CN108073441B (en) * | 2016-11-14 | 2022-05-10 | 阿里巴巴集团控股有限公司 | Virtual machine memory supervision method and equipment |
CN108664390A (en) * | 2017-03-31 | 2018-10-16 | 华为技术有限公司 | A kind of method for detecting memory leakage and equipment |
CN107102922A (en) * | 2017-04-01 | 2017-08-29 | 北京三快在线科技有限公司 | Internal-memory detection method, device and electronic equipment |
CN109032827A (en) * | 2018-07-03 | 2018-12-18 | 郑州云海信息技术有限公司 | It is a kind of to track the test macro and method for leading to memory overflow exception |
CN110502891A (en) * | 2019-08-08 | 2019-11-26 | 北京字节跳动网络技术有限公司 | A kind of method, apparatus, medium and electronic equipment obtaining proceeding internal memory leakage |
CN110888712A (en) * | 2019-10-10 | 2020-03-17 | 望海康信(北京)科技股份公司 | Java virtual machine optimization method and system |
CN110888712B (en) * | 2019-10-10 | 2022-10-11 | 望海康信(北京)科技股份公司 | Java virtual machine optimization method and system |
CN111352829A (en) * | 2019-11-21 | 2020-06-30 | 杭州迪普科技股份有限公司 | Memory leak test method, device and equipment |
CN111352734A (en) * | 2020-02-26 | 2020-06-30 | 烽火通信科技股份有限公司 | Memory leak detection method and memory management module |
CN111858339A (en) * | 2020-07-22 | 2020-10-30 | 腾讯科技(成都)有限公司 | Memory analysis method, device and system, computing device and computer-readable storage medium |
CN111858339B (en) * | 2020-07-22 | 2023-11-28 | 腾讯科技(成都)有限公司 | Memory analysis method, device and system, computing device and computer readable storage medium |
CN111858068A (en) * | 2020-07-31 | 2020-10-30 | 重庆紫光华山智安科技有限公司 | Method and device for positioning Java program performance problem |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103714004A (en) | JVM online memory leak analysis method and system | |
US10229129B2 (en) | Method and apparatus for managing time series database | |
EP3182288B1 (en) | Systems and methods for generating performance prediction model and estimating execution time for applications | |
WO2018149345A1 (en) | Data processing method and device | |
WO2017045472A1 (en) | Resource prediction method and system, and capacity management apparatus | |
US20150046512A1 (en) | Dynamic collection analysis and reporting of telemetry data | |
TW201800967A (en) | Method and device for processing distributed streaming data | |
WO2013025874A3 (en) | Page reporting | |
CN109697456A (en) | Business diagnosis method, apparatus, equipment and storage medium | |
EP2897401B1 (en) | Method and device for guaranteeing consistency of planning data | |
CN109388614A (en) | A kind of method, system and the equipment of catalogue file number quota | |
CN103714086A (en) | Method and device used for generating non-relational data base module | |
US20180196861A1 (en) | Method for generating graph database of incident resources and apparatus thereof | |
CN105227405A (en) | Method for supervising and system | |
CN104778185A (en) | Determination method for abnormal SQL (structured query language) statement and server | |
CN104113605A (en) | Enterprise cloud application development monitoring processing method | |
CN103729378A (en) | Updating method and device for IP geographic information | |
CN105159925B (en) | A kind of data-base cluster data distributing method and system | |
CN104391879A (en) | Method and device for hierarchical clustering | |
CN104184601B (en) | The acquisition methods and device of user's online hours | |
CN105242873B (en) | The acquisition of the performance data of cloud computing system and storage method and device | |
JP2015201060A (en) | sensor data collection system | |
CN105610899A (en) | Text file parallel uploading method and device | |
CN105429792A (en) | User behavior flow obtaining method and device and user behavior analysis method and system | |
CN112217657A (en) | Data transmission method, data processing method, device and medium based on SD-WAN system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140409 |